Advertisement
Guest User

Untitled

a guest
May 4th, 2022
171
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 69.01 KB | None | 0 0
  1. trash: Added new job source 0x56115bc830a0 (GVfsBackendTrash)
  2. trash: Queued new job 0x56115bc83840 (GVfsJobMount)
  3. trash: send_reply(0x56115bc83840), failed=0 ()
  4. trash: backend_dbus_handler org.gtk.vfs.Mount:CreateFileMonitor (pid=21265)
  5. trash: Queued new job 0x56115bc83ba0 (GVfsJobCreateMonitor)
  6. trash: send_reply(0x56115bc83ba0), failed=0 ()
  7. trash: backend_dbus_handler org.gtk.vfs.Mount:CreateFileMonitor (pid=21265)
  8. trash: Queued new job 0x56115bc83ba0 (GVfsJobCreateMonitor)
  9. trash: send_reply(0x56115bc83ba0), failed=0 ()
  10. trash: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
  11. trash: Queued new job 0x56115bc6bb50 (GVfsJobQueryInfo)
  12. trash: send_reply(0x56115bc6bb50), failed=0 ()
  13. trash: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
  14. trash: Queued new job 0x56115bc6bbf0 (GVfsJobQueryInfo)
  15. trash: send_reply(0x56115bc6bbf0), failed=0 ()
  16. smb-network: g_vfs_backend_smb_browse_init: default workgroup = 'NULL'
  17. smb-network: Added new job source 0x55898e0b2080 (GVfsBackendSmbBrowse)
  18. smb-network: Queued new job 0x55898e0b59c0 (GVfsJobMount)
  19. INFO: Current debug levels:
  20. all: 10
  21. tdb: 10
  22. printdrivers: 10
  23. lanman: 10
  24. smb: 10
  25. rpc_parse: 10
  26. rpc_srv: 10
  27. rpc_cli: 10
  28. passdb: 10
  29. sam: 10
  30. auth: 10
  31. winbind: 10
  32. vfs: 10
  33. idmap: 10
  34. quota: 10
  35. acls: 10
  36. locking: 10
  37. msdfs: 10
  38. dmapi: 10
  39. registry: 10
  40. scavenger: 10
  41. dns: 10
  42. ldb: 10
  43. tevent: 10
  44. auth_audit: 10
  45. auth_json_audit: 10
  46. kerberos: 10
  47. drs_repl: 10
  48. smb2: 10
  49. smb2_credits: 10
  50. dsdb_audit: 10
  51. dsdb_json_audit: 10
  52. dsdb_password_audit: 10
  53. dsdb_password_json_audit: 10
  54. dsdb_transaction_audit: 10
  55. dsdb_transaction_json_audit: 10
  56. dsdb_group_audit: 10
  57. dsdb_group_json_audit: 10
  58. Using netbios name HOST.
  59. Using workgroup SAMBA.
  60. smb-network: do_mount - URI = smb://192.168.0.100
  61. smb-network: do_mount - try #0
  62. parsed path: fname='smb://192.168.0.100' server='192.168.0.100' share='' path='' options=''
  63. SMBC_check_options(): server='192.168.0.100' share='' path='' options=''
  64. smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
  65. smb-network: returning (nil)
  66. smb-network: auth_callback - anonymous pass
  67. smb-network: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
  68. smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
  69. smb-network: returning (nil)
  70. smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
  71. smb-network: returning (nil)
  72. smb-network: auth_callback - anonymous pass
  73. smb-network: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
  74. smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
  75. smb-network: returning (nil)
  76. SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
  77. -> server_n=[192.168.0.100] server=[192.168.0.100]
  78. Connecting to 192.168.0.100 at port 139
  79. socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
  80. Kerberos auth with 'jason@SAMBA' (SAMBA\jason) to access '192.168.0.100' not possible
  81. SPNEGO login failed: {Access Denied} A process has requested access to an object but has not been granted those access rights.
  82. cli_session_setup_spnego_send: Connect to 192.168.0.100 as (null) using SPNEGO
  83. GENSEC backend 'gssapi_spnego' registered
  84. GENSEC backend 'gssapi_krb5' registered
  85. GENSEC backend 'gssapi_krb5_sasl' registered
  86. GENSEC backend 'spnego' registered
  87. GENSEC backend 'schannel' registered
  88. GENSEC backend 'naclrpc_as_system' registered
  89. GENSEC backend 'sasl-EXTERNAL' registered
  90. GENSEC backend 'ntlmssp' registered
  91. GENSEC backend 'ntlmssp_resume_ccache' registered
  92. GENSEC backend 'http_basic' registered
  93. GENSEC backend 'http_ntlm' registered
  94. GENSEC backend 'http_negotiate' registered
  95. Starting GENSEC mechanism spnego
  96. Starting GENSEC submechanism ntlmssp
  97. negotiate: struct NEGOTIATE_MESSAGE
  98. Signature : 'NTLMSSP'
  99. MessageType : NtLmNegotiate (1)
  100. NegotiateFlags : 0x62088215 (1644724757)
  101. 1: NTLMSSP_NEGOTIATE_UNICODE
  102. 0: NTLMSSP_NEGOTIATE_OEM
  103. 1: NTLMSSP_REQUEST_TARGET
  104. 1: NTLMSSP_NEGOTIATE_SIGN
  105. 0: NTLMSSP_NEGOTIATE_SEAL
  106. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  107. 0: NTLMSSP_NEGOTIATE_LM_KEY
  108. 0: NTLMSSP_NEGOTIATE_NETWARE
  109. 1: NTLMSSP_NEGOTIATE_NTLM
  110. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  111. 0: NTLMSSP_ANONYMOUS
  112. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  113. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  114. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  115. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  116. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  117. 0: NTLMSSP_TARGET_TYPE_SERVER
  118. 0: NTLMSSP_TARGET_TYPE_SHARE
  119. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  120. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  121. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  122. 0: NTLMSSP_NEGOTIATE_TARGET_INFO
  123. 1: NTLMSSP_NEGOTIATE_VERSION
  124. 1: NTLMSSP_NEGOTIATE_128
  125. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  126. 0: NTLMSSP_NEGOTIATE_56
  127. DomainNameLen : 0x0000 (0)
  128. DomainNameMaxLen : 0x0000 (0)
  129. DomainName : *
  130. DomainName : ''
  131. WorkstationLen : 0x0000 (0)
  132. WorkstationMaxLen : 0x0000 (0)
  133. Workstation : *
  134. Workstation : ''
  135. Version: struct ntlmssp_VERSION
  136. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
  137. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
  138. ProductBuild : 0x0000 (0)
  139. Reserved: ARRAY(3)
  140. [0] : 0x00 (0)
  141. [1] : 0x00 (0)
  142. [2] : 0x00 (0)
  143. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
  144. gensec_update_send: ntlmssp[0x7fcb8c01ec90]: subreq: 0x7fcb8c018930
  145. gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c023040
  146. gensec_update_done: ntlmssp[0x7fcb8c01ec90]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c018930/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c018af0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
  147. gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c023040/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c023200)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  148. Got challenge flags:
  149. Got NTLMSSP neg_flags=0x628a8215
  150. NTLMSSP_NEGOTIATE_UNICODE
  151. NTLMSSP_REQUEST_TARGET
  152. NTLMSSP_NEGOTIATE_SIGN
  153. NTLMSSP_NEGOTIATE_NTLM
  154. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  155. NTLMSSP_TARGET_TYPE_SERVER
  156. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  157. NTLMSSP_NEGOTIATE_TARGET_INFO
  158. NTLMSSP_NEGOTIATE_VERSION
  159. NTLMSSP_NEGOTIATE_128
  160. NTLMSSP_NEGOTIATE_KEY_EXCH
  161. challenge: struct CHALLENGE_MESSAGE
  162. Signature : 'NTLMSSP'
  163. MessageType : NtLmChallenge (0x2)
  164. TargetNameLen : 0x000c (12)
  165. TargetNameMaxLen : 0x000c (12)
  166. TargetName : *
  167. TargetName : 'LANBOX'
  168. NegotiateFlags : 0x628a8215 (1653244437)
  169. 1: NTLMSSP_NEGOTIATE_UNICODE
  170. 0: NTLMSSP_NEGOTIATE_OEM
  171. 1: NTLMSSP_REQUEST_TARGET
  172. 1: NTLMSSP_NEGOTIATE_SIGN
  173. 0: NTLMSSP_NEGOTIATE_SEAL
  174. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  175. 0: NTLMSSP_NEGOTIATE_LM_KEY
  176. 0: NTLMSSP_NEGOTIATE_NETWARE
  177. 1: NTLMSSP_NEGOTIATE_NTLM
  178. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  179. 0: NTLMSSP_ANONYMOUS
  180. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  181. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  182. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  183. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  184. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  185. 1: NTLMSSP_TARGET_TYPE_SERVER
  186. 0: NTLMSSP_TARGET_TYPE_SHARE
  187. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  188. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  189. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  190. 1: NTLMSSP_NEGOTIATE_TARGET_INFO
  191. 1: NTLMSSP_NEGOTIATE_VERSION
  192. 1: NTLMSSP_NEGOTIATE_128
  193. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  194. 0: NTLMSSP_NEGOTIATE_56
  195. ServerChallenge : d68c3cbc58b462b5
  196. Reserved : 0000000000000000
  197. TargetInfoLen : 0x006a (106)
  198. TargetInfoMaxLen : 0x006a (106)
  199. TargetInfo : *
  200. TargetInfo: struct AV_PAIR_LIST
  201. count : 0x00000006 (6)
  202. pair: ARRAY(6)
  203. pair: struct AV_PAIR
  204. AvId : MsvAvNbDomainName (0x2)
  205. AvLen : 0x000c (12)
  206. Value : union ntlmssp_AvValue(case 0x2)
  207. AvNbDomainName : 'LANBOX'
  208. pair: struct AV_PAIR
  209. AvId : MsvAvNbComputerName (0x1)
  210. AvLen : 0x000c (12)
  211. Value : union ntlmssp_AvValue(case 0x1)
  212. AvNbComputerName : 'LANBOX'
  213. pair: struct AV_PAIR
  214. AvId : MsvAvDnsDomainName (0x4)
  215. AvLen : 0x0012 (18)
  216. Value : union ntlmssp_AvValue(case 0x4)
  217. AvDnsDomainName : 'local.lan'
  218. pair: struct AV_PAIR
  219. AvId : MsvAvDnsComputerName (0x3)
  220. AvLen : 0x0020 (32)
  221. Value : union ntlmssp_AvValue(case 0x3)
  222. AvDnsComputerName : 'lanbox.local.lan'
  223. pair: struct AV_PAIR
  224. AvId : MsvAvTimestamp (0x7)
  225. AvLen : 0x0008 (8)
  226. Value : union ntlmssp_AvValue(case 0x7)
  227. AvTimestamp : Wed May 4 04:27:04 AM 2022 CST
  228. pair: struct AV_PAIR
  229. AvId : MsvAvEOL (0x0)
  230. AvLen : 0x0000 (0)
  231. Value : union ntlmssp_AvValue(case 0x0)
  232. Version: struct ntlmssp_VERSION
  233. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
  234. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
  235. ProductBuild : 0x0000 (0)
  236. Reserved : 000000
  237. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
  238. authenticate: struct AUTHENTICATE_MESSAGE
  239. Signature : 'NTLMSSP'
  240. MessageType : NtLmAuthenticate (3)
  241. LmChallengeResponseLen : 0x0000 (0)
  242. LmChallengeResponseMaxLen: 0x0000 (0)
  243. LmChallengeResponse : *
  244. LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 0)
  245. NtChallengeResponseLen : 0x0000 (0)
  246. NtChallengeResponseMaxLen: 0x0000 (0)
  247. NtChallengeResponse : *
  248. NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 0)
  249. DomainNameLen : 0x0000 (0)
  250. DomainNameMaxLen : 0x0000 (0)
  251. DomainName : *
  252. DomainName : ''
  253. UserNameLen : 0x0000 (0)
  254. UserNameMaxLen : 0x0000 (0)
  255. UserName : *
  256. UserName : ''
  257. WorkstationLen : 0x0000 (0)
  258. WorkstationMaxLen : 0x0000 (0)
  259. Workstation : *
  260. Workstation : ''
  261. EncryptedRandomSessionKeyLen: 0x0010 (16)
  262. EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
  263. EncryptedRandomSessionKey: *
  264. EncryptedRandomSessionKey: DATA_BLOB length=16
  265. [0000] D9 99 A0 EC 23 C4 1D BB 62 63 B5 EB 93 62 15 61 ....#... bc...b.a
  266. NegotiateFlags : 0x62008a15 (1644202517)
  267. 1: NTLMSSP_NEGOTIATE_UNICODE
  268. 0: NTLMSSP_NEGOTIATE_OEM
  269. 1: NTLMSSP_REQUEST_TARGET
  270. 1: NTLMSSP_NEGOTIATE_SIGN
  271. 0: NTLMSSP_NEGOTIATE_SEAL
  272. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  273. 0: NTLMSSP_NEGOTIATE_LM_KEY
  274. 0: NTLMSSP_NEGOTIATE_NETWARE
  275. 1: NTLMSSP_NEGOTIATE_NTLM
  276. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  277. 1: NTLMSSP_ANONYMOUS
  278. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  279. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  280. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  281. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  282. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  283. 0: NTLMSSP_TARGET_TYPE_SERVER
  284. 0: NTLMSSP_TARGET_TYPE_SHARE
  285. 0: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  286. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  287. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  288. 0: NTLMSSP_NEGOTIATE_TARGET_INFO
  289. 1: NTLMSSP_NEGOTIATE_VERSION
  290. 1: NTLMSSP_NEGOTIATE_128
  291. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  292. 0: NTLMSSP_NEGOTIATE_56
  293. Version: struct ntlmssp_VERSION
  294. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
  295. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
  296. ProductBuild : 0x0000 (0)
  297. Reserved: ARRAY(3)
  298. [0] : 0x00 (0)
  299. [1] : 0x00 (0)
  300. [2] : 0x00 (0)
  301. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
  302. NTLMSSP: Set final flags:
  303. Got NTLMSSP neg_flags=0x62008a15
  304. NTLMSSP_NEGOTIATE_UNICODE
  305. NTLMSSP_REQUEST_TARGET
  306. NTLMSSP_NEGOTIATE_SIGN
  307. NTLMSSP_NEGOTIATE_NTLM
  308. NTLMSSP_ANONYMOUS
  309. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  310. NTLMSSP_NEGOTIATE_VERSION
  311. NTLMSSP_NEGOTIATE_128
  312. NTLMSSP_NEGOTIATE_KEY_EXCH
  313. NTLMSSP Sign/Seal - Initialising with flags:
  314. Got NTLMSSP neg_flags=0x62008a15
  315. NTLMSSP_NEGOTIATE_UNICODE
  316. NTLMSSP_REQUEST_TARGET
  317. NTLMSSP_NEGOTIATE_SIGN
  318. NTLMSSP_NEGOTIATE_NTLM
  319. NTLMSSP_ANONYMOUS
  320. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  321. NTLMSSP_NEGOTIATE_VERSION
  322. NTLMSSP_NEGOTIATE_128
  323. NTLMSSP_NEGOTIATE_KEY_EXCH
  324. NTLMSSP Sign/Seal - using NTLM1
  325. dump_arc4_state: NTLMv1 arc4 state:
  326.  
  327. gensec_update_send: ntlmssp[0x7fcb8c01ec90]: subreq: 0x7fcb8c0050f0
  328. gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c037720
  329. gensec_update_done: ntlmssp[0x7fcb8c01ec90]: NT_STATUS_OK tevent_req[0x7fcb8c0050f0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c0052b0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
  330. gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c037720/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c0378e0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  331. NTLMSSP Sign/Seal - Initialising with flags:
  332. Got NTLMSSP neg_flags=0x62008a15
  333. NTLMSSP_NEGOTIATE_UNICODE
  334. NTLMSSP_REQUEST_TARGET
  335. NTLMSSP_NEGOTIATE_SIGN
  336. NTLMSSP_NEGOTIATE_NTLM
  337. NTLMSSP_ANONYMOUS
  338. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  339. NTLMSSP_NEGOTIATE_VERSION
  340. NTLMSSP_NEGOTIATE_128
  341. NTLMSSP_NEGOTIATE_KEY_EXCH
  342. NTLMSSP Sign/Seal - using NTLM1
  343. dump_arc4_state: NTLMv1 arc4 state:
  344.  
  345. gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c037720
  346. gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_OK tevent_req[0x7fcb8c037720/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c0378e0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  347. session setup ok
  348. map_errno_from_nt_status: 32 bit codes: code=c0000022
  349. smb-network: do_mount - [smb://192.168.0.100; 0] dir = (nil), cancelled = 0, errno = [13] 'Permission denied'
  350. smb-network: purging server cache
  351. smb-network: do_mount - after anon, enabling NTLMSSP fallback
  352. smb-network: do_mount - try #1
  353. parsed path: fname='smb://192.168.0.100' server='192.168.0.100' share='' path='' options=''
  354. SMBC_check_options(): server='192.168.0.100' share='' path='' options=''
  355. smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'SAMBA';'jason'
  356. smb-network: returning (nil)
  357. smb-network: auth_callback - normal pass
  358. smb-network: auth_callback - reusing keyring credentials: user = 'darkstar', domain = 'WORKGROUP'
  359. smb-network: auth_callback - out: last_user = 'darkstar', last_domain = 'WORKGROUP'
  360. smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'WORKGROUP';'darkstar'
  361. smb-network: returning (nil)
  362. smb-network: looking up cached server '192.168.0.100'\'IPC$', user 'WORKGROUP';'darkstar'
  363. smb-network: returning (nil)
  364. SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
  365. -> server_n=[192.168.0.100] server=[192.168.0.100]
  366. Connecting to 192.168.0.100 at port 139
  367. socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
  368. cli_session_setup_spnego_send: Connect to 192.168.0.100 as darkstar@WORKGROUP using SPNEGO
  369. Starting GENSEC mechanism spnego
  370. Starting GENSEC submechanism gse_krb5
  371. Cannot do GSE to an IP address
  372. Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
  373. Starting GENSEC submechanism ntlmssp
  374. negotiate: struct NEGOTIATE_MESSAGE
  375. Signature : 'NTLMSSP'
  376. MessageType : NtLmNegotiate (1)
  377. NegotiateFlags : 0x62088215 (1644724757)
  378. 1: NTLMSSP_NEGOTIATE_UNICODE
  379. 0: NTLMSSP_NEGOTIATE_OEM
  380. 1: NTLMSSP_REQUEST_TARGET
  381. 1: NTLMSSP_NEGOTIATE_SIGN
  382. 0: NTLMSSP_NEGOTIATE_SEAL
  383. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  384. 0: NTLMSSP_NEGOTIATE_LM_KEY
  385. 0: NTLMSSP_NEGOTIATE_NETWARE
  386. 1: NTLMSSP_NEGOTIATE_NTLM
  387. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  388. 0: NTLMSSP_ANONYMOUS
  389. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  390. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  391. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  392. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  393. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  394. 0: NTLMSSP_TARGET_TYPE_SERVER
  395. 0: NTLMSSP_TARGET_TYPE_SHARE
  396. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  397. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  398. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  399. 0: NTLMSSP_NEGOTIATE_TARGET_INFO
  400. 1: NTLMSSP_NEGOTIATE_VERSION
  401. 1: NTLMSSP_NEGOTIATE_128
  402. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  403. 0: NTLMSSP_NEGOTIATE_56
  404. DomainNameLen : 0x0000 (0)
  405. DomainNameMaxLen : 0x0000 (0)
  406. DomainName : *
  407. DomainName : ''
  408. WorkstationLen : 0x0000 (0)
  409. WorkstationMaxLen : 0x0000 (0)
  410. Workstation : *
  411. Workstation : ''
  412. Version: struct ntlmssp_VERSION
  413. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
  414. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
  415. ProductBuild : 0x0000 (0)
  416. Reserved: ARRAY(3)
  417. [0] : 0x00 (0)
  418. [1] : 0x00 (0)
  419. [2] : 0x00 (0)
  420. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
  421. gensec_update_send: ntlmssp[0x7fcb8c040490]: subreq: 0x7fcb8c018930
  422. gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c042e40
  423. gensec_update_done: ntlmssp[0x7fcb8c040490]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c018930/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c018af0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
  424. gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c042e40/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c043000)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  425. Got challenge flags:
  426. Got NTLMSSP neg_flags=0x628a8215
  427. NTLMSSP_NEGOTIATE_UNICODE
  428. NTLMSSP_REQUEST_TARGET
  429. NTLMSSP_NEGOTIATE_SIGN
  430. NTLMSSP_NEGOTIATE_NTLM
  431. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  432. NTLMSSP_TARGET_TYPE_SERVER
  433. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  434. NTLMSSP_NEGOTIATE_TARGET_INFO
  435. NTLMSSP_NEGOTIATE_VERSION
  436. NTLMSSP_NEGOTIATE_128
  437. NTLMSSP_NEGOTIATE_KEY_EXCH
  438. challenge: struct CHALLENGE_MESSAGE
  439. Signature : 'NTLMSSP'
  440. MessageType : NtLmChallenge (0x2)
  441. TargetNameLen : 0x000c (12)
  442. TargetNameMaxLen : 0x000c (12)
  443. TargetName : *
  444. TargetName : 'LANBOX'
  445. NegotiateFlags : 0x628a8215 (1653244437)
  446. 1: NTLMSSP_NEGOTIATE_UNICODE
  447. 0: NTLMSSP_NEGOTIATE_OEM
  448. 1: NTLMSSP_REQUEST_TARGET
  449. 1: NTLMSSP_NEGOTIATE_SIGN
  450. 0: NTLMSSP_NEGOTIATE_SEAL
  451. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  452. 0: NTLMSSP_NEGOTIATE_LM_KEY
  453. 0: NTLMSSP_NEGOTIATE_NETWARE
  454. 1: NTLMSSP_NEGOTIATE_NTLM
  455. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  456. 0: NTLMSSP_ANONYMOUS
  457. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  458. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  459. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  460. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  461. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  462. 1: NTLMSSP_TARGET_TYPE_SERVER
  463. 0: NTLMSSP_TARGET_TYPE_SHARE
  464. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  465. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  466. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  467. 1: NTLMSSP_NEGOTIATE_TARGET_INFO
  468. 1: NTLMSSP_NEGOTIATE_VERSION
  469. 1: NTLMSSP_NEGOTIATE_128
  470. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  471. 0: NTLMSSP_NEGOTIATE_56
  472. ServerChallenge : 6b3873603e141c16
  473. Reserved : 0000000000000000
  474. TargetInfoLen : 0x006a (106)
  475. TargetInfoMaxLen : 0x006a (106)
  476. TargetInfo : *
  477. TargetInfo: struct AV_PAIR_LIST
  478. count : 0x00000006 (6)
  479. pair: ARRAY(6)
  480. pair: struct AV_PAIR
  481. AvId : MsvAvNbDomainName (0x2)
  482. AvLen : 0x000c (12)
  483. Value : union ntlmssp_AvValue(case 0x2)
  484. AvNbDomainName : 'LANBOX'
  485. pair: struct AV_PAIR
  486. AvId : MsvAvNbComputerName (0x1)
  487. AvLen : 0x000c (12)
  488. Value : union ntlmssp_AvValue(case 0x1)
  489. AvNbComputerName : 'LANBOX'
  490. pair: struct AV_PAIR
  491. AvId : MsvAvDnsDomainName (0x4)
  492. AvLen : 0x0012 (18)
  493. Value : union ntlmssp_AvValue(case 0x4)
  494. AvDnsDomainName : 'local.lan'
  495. pair: struct AV_PAIR
  496. AvId : MsvAvDnsComputerName (0x3)
  497. AvLen : 0x0020 (32)
  498. Value : union ntlmssp_AvValue(case 0x3)
  499. AvDnsComputerName : 'lanbox.local.lan'
  500. pair: struct AV_PAIR
  501. AvId : MsvAvTimestamp (0x7)
  502. AvLen : 0x0008 (8)
  503. Value : union ntlmssp_AvValue(case 0x7)
  504. AvTimestamp : Wed May 4 04:27:04 AM 2022 CST
  505. pair: struct AV_PAIR
  506. AvId : MsvAvEOL (0x0)
  507. AvLen : 0x0000 (0)
  508. Value : union ntlmssp_AvValue(case 0x0)
  509. Version: struct ntlmssp_VERSION
  510. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
  511. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
  512. ProductBuild : 0x0000 (0)
  513. Reserved : 000000
  514. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
  515. authenticate: struct AUTHENTICATE_MESSAGE
  516. Signature : 'NTLMSSP'
  517. MessageType : NtLmAuthenticate (3)
  518. LmChallengeResponseLen : 0x0018 (24)
  519. LmChallengeResponseMaxLen: 0x0018 (24)
  520. LmChallengeResponse : *
  521. LmChallengeResponse : union ntlmssp_LM_RESPONSE_with_len(case 24)
  522. v1: struct LM_RESPONSE
  523. Response : 000000000000000000000000000000000000000000000000
  524. NtChallengeResponseLen : 0x010e (270)
  525. NtChallengeResponseMaxLen: 0x010e (270)
  526. NtChallengeResponse : *
  527. NtChallengeResponse : union ntlmssp_NTLM_RESPONSE_with_len(case 270)
  528. v2: struct NTLMv2_RESPONSE
  529. Response : c45d11e38bf2149c8a94357cbf32d427
  530. Challenge: struct NTLMv2_CLIENT_CHALLENGE
  531. RespType : 0x01 (1)
  532. HiRespType : 0x01 (1)
  533. Reserved1 : 0x0000 (0)
  534. Reserved2 : 0x00000000 (0)
  535. TimeStamp : Wed May 4 04:27:04 AM 2022 CST
  536. ChallengeFromClient : abd7046e10e56eaa
  537. Reserved3 : 0x00000000 (0)
  538. AvPairs: struct AV_PAIR_LIST
  539. count : 0x0000000a (10)
  540. pair: ARRAY(10)
  541. pair: struct AV_PAIR
  542. AvId : MsvAvNbDomainName (0x2)
  543. AvLen : 0x000c (12)
  544. Value : union ntlmssp_AvValue(case 0x2)
  545. AvNbDomainName : 'LANBOX'
  546. pair: struct AV_PAIR
  547. AvId : MsvAvNbComputerName (0x1)
  548. AvLen : 0x000c (12)
  549. Value : union ntlmssp_AvValue(case 0x1)
  550. AvNbComputerName : 'LANBOX'
  551. pair: struct AV_PAIR
  552. AvId : MsvAvDnsDomainName (0x4)
  553. AvLen : 0x0012 (18)
  554. Value : union ntlmssp_AvValue(case 0x4)
  555. AvDnsDomainName : 'local.lan'
  556. pair: struct AV_PAIR
  557. AvId : MsvAvDnsComputerName (0x3)
  558. AvLen : 0x0020 (32)
  559. Value : union ntlmssp_AvValue(case 0x3)
  560. AvDnsComputerName : 'lanbox.local.lan'
  561. pair: struct AV_PAIR
  562. AvId : MsvAvTimestamp (0x7)
  563. AvLen : 0x0008 (8)
  564. Value : union ntlmssp_AvValue(case 0x7)
  565. AvTimestamp : Wed May 4 04:27:04 AM 2022 CST
  566. pair: struct AV_PAIR
  567. AvId : MsvAvFlags (0x6)
  568. AvLen : 0x0004 (4)
  569. Value : union ntlmssp_AvValue(case 0x6)
  570. AvFlags : 0x00000002 (2)
  571. 0: NTLMSSP_AVFLAG_CONSTRAINTED_ACCOUNT
  572. 1: NTLMSSP_AVFLAG_MIC_IN_AUTHENTICATE_MESSAGE
  573. 0: NTLMSSP_AVFLAG_TARGET_SPN_FROM_UNTRUSTED_SOURCE
  574. pair: struct AV_PAIR
  575. AvId : MsvAvSingleHost (0x8)
  576. AvLen : 0x0030 (48)
  577. Value : union ntlmssp_AvValue(case 0x8)
  578. AvSingleHost: struct ntlmssp_SingleHostData
  579. Size : 0x00000030 (48)
  580. Z4 : 0x00000000 (0)
  581. token_info: struct LSAP_TOKEN_INFO_INTEGRITY
  582. Flags : 0x00000000 (0)
  583. TokenIL : 0x00000000 (0)
  584. MachineId : 5c37563dacd89f9fb424b533639b1a5f76134dc61580117043c3c2ce69657461
  585. remaining : DATA_BLOB length=0
  586. pair: struct AV_PAIR
  587. AvId : MsvChannelBindings (0xA)
  588. AvLen : 0x0010 (16)
  589. Value : union ntlmssp_AvValue(case 0xA)
  590. ChannelBindings : 00000000000000000000000000000000
  591. pair: struct AV_PAIR
  592. AvId : MsvAvTargetName (0x9)
  593. AvLen : 0x0024 (36)
  594. Value : union ntlmssp_AvValue(case 0x9)
  595. AvTargetName : 'cifs/192.168.0.100'
  596. pair: struct AV_PAIR
  597. AvId : MsvAvEOL (0x0)
  598. AvLen : 0x0000 (0)
  599. Value : union ntlmssp_AvValue(case 0x0)
  600. DomainNameLen : 0x0012 (18)
  601. DomainNameMaxLen : 0x0012 (18)
  602. DomainName : *
  603. DomainName : 'WORKGROUP'
  604. UserNameLen : 0x0010 (16)
  605. UserNameMaxLen : 0x0010 (16)
  606. UserName : *
  607. UserName : 'darkstar'
  608. WorkstationLen : 0x0008 (8)
  609. WorkstationMaxLen : 0x0008 (8)
  610. Workstation : *
  611. Workstation : 'HOST'
  612. EncryptedRandomSessionKeyLen: 0x0010 (16)
  613. EncryptedRandomSessionKeyMaxLen: 0x0010 (16)
  614. EncryptedRandomSessionKey: *
  615. EncryptedRandomSessionKey: DATA_BLOB length=16
  616. [0000] 1A 4B FD FE BE 65 7F 1D 95 BF 08 39 AF B6 88 36 .K...e.. ...9...6
  617. NegotiateFlags : 0x62088215 (1644724757)
  618. 1: NTLMSSP_NEGOTIATE_UNICODE
  619. 0: NTLMSSP_NEGOTIATE_OEM
  620. 1: NTLMSSP_REQUEST_TARGET
  621. 1: NTLMSSP_NEGOTIATE_SIGN
  622. 0: NTLMSSP_NEGOTIATE_SEAL
  623. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  624. 0: NTLMSSP_NEGOTIATE_LM_KEY
  625. 0: NTLMSSP_NEGOTIATE_NETWARE
  626. 1: NTLMSSP_NEGOTIATE_NTLM
  627. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  628. 0: NTLMSSP_ANONYMOUS
  629. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  630. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  631. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  632. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  633. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  634. 0: NTLMSSP_TARGET_TYPE_SERVER
  635. 0: NTLMSSP_TARGET_TYPE_SHARE
  636. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  637. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  638. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  639. 0: NTLMSSP_NEGOTIATE_TARGET_INFO
  640. 1: NTLMSSP_NEGOTIATE_VERSION
  641. 1: NTLMSSP_NEGOTIATE_128
  642. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  643. 0: NTLMSSP_NEGOTIATE_56
  644. Version: struct ntlmssp_VERSION
  645. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
  646. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
  647. ProductBuild : 0x0000 (0)
  648. Reserved: ARRAY(3)
  649. [0] : 0x00 (0)
  650. [1] : 0x00 (0)
  651. [2] : 0x00 (0)
  652. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
  653. NTLMSSP: Set final flags:
  654. Got NTLMSSP neg_flags=0x62088215
  655. NTLMSSP_NEGOTIATE_UNICODE
  656. NTLMSSP_REQUEST_TARGET
  657. NTLMSSP_NEGOTIATE_SIGN
  658. NTLMSSP_NEGOTIATE_NTLM
  659. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  660. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  661. NTLMSSP_NEGOTIATE_VERSION
  662. NTLMSSP_NEGOTIATE_128
  663. NTLMSSP_NEGOTIATE_KEY_EXCH
  664. NTLMSSP Sign/Seal - Initialising with flags:
  665. Got NTLMSSP neg_flags=0x62088215
  666. NTLMSSP_NEGOTIATE_UNICODE
  667. NTLMSSP_REQUEST_TARGET
  668. NTLMSSP_NEGOTIATE_SIGN
  669. NTLMSSP_NEGOTIATE_NTLM
  670. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  671. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  672. NTLMSSP_NEGOTIATE_VERSION
  673. NTLMSSP_NEGOTIATE_128
  674. NTLMSSP_NEGOTIATE_KEY_EXCH
  675. dump_arc4_state: NTLMSSP send seal arc4 state:
  676.  
  677. dump_arc4_state: NTLMSSP recv seal arc4 state:
  678.  
  679. gensec_update_send: ntlmssp[0x7fcb8c040490]: subreq: 0x7fcb8c0050f0
  680. gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c042e40
  681. gensec_update_done: ntlmssp[0x7fcb8c040490]: NT_STATUS_OK tevent_req[0x7fcb8c0050f0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7fcb8c0052b0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:222]
  682. gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7fcb8c042e40/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c043000)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  683. ntlmssp_check_packet: NTLMSSP signature OK !
  684. NTLMSSP Sign/Seal - Initialising with flags:
  685. Got NTLMSSP neg_flags=0x62088215
  686. NTLMSSP_NEGOTIATE_UNICODE
  687. NTLMSSP_REQUEST_TARGET
  688. NTLMSSP_NEGOTIATE_SIGN
  689. NTLMSSP_NEGOTIATE_NTLM
  690. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  691. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  692. NTLMSSP_NEGOTIATE_VERSION
  693. NTLMSSP_NEGOTIATE_128
  694. NTLMSSP_NEGOTIATE_KEY_EXCH
  695. dump_arc4_state: NTLMSSP send seal arc4 state:
  696.  
  697. dump_arc4_state: NTLMSSP recv seal arc4 state:
  698.  
  699. gensec_update_send: spnego[0x7fcb8c016e60]: subreq: 0x7fcb8c042e40
  700. gensec_update_done: spnego[0x7fcb8c016e60]: NT_STATUS_OK tevent_req[0x7fcb8c042e40/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7fcb8c043000)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  701. session setup ok
  702. signed SMB2 message (sign_algo_id=1)
  703. tconx ok
  704. IPC$ so ignore case sensitivity
  705. smb-network: adding cached server '192.168.0.100'\'IPC$', user 'WORKGROUP';'darkstar' with data 0x7fcb8c042890
  706. Server connect ok: //192.168.0.100/IPC$: 0x7fcb8c042890
  707. Bind RPC Pipe: host 192.168.0.100 auth_type 0, auth_level 1
  708. &r: struct ncacn_packet
  709. rpc_vers : 0x05 (5)
  710. rpc_vers_minor : 0x00 (0)
  711. ptype : DCERPC_PKT_BIND (11)
  712. pfc_flags : 0x03 (3)
  713. 1: DCERPC_PFC_FLAG_FIRST
  714. 1: DCERPC_PFC_FLAG_LAST
  715. 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
  716. 0: DCERPC_PFC_FLAG_CONC_MPX
  717. 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
  718. 0: DCERPC_PFC_FLAG_MAYBE
  719. 0: DCERPC_PFC_FLAG_OBJECT_UUID
  720. drep: ARRAY(4)
  721. [0] : 0x10 (16)
  722. [1] : 0x00 (0)
  723. [2] : 0x00 (0)
  724. [3] : 0x00 (0)
  725. frag_length : 0x0048 (72)
  726. auth_length : 0x0000 (0)
  727. call_id : 0x00000001 (1)
  728. u : union dcerpc_payload(case 11)
  729. bind: struct dcerpc_bind
  730. max_xmit_frag : 0x10b8 (4280)
  731. max_recv_frag : 0x10b8 (4280)
  732. assoc_group_id : 0x00000000 (0)
  733. num_contexts : 0x01 (1)
  734. ctx_list: ARRAY(1)
  735. ctx_list: struct dcerpc_ctx_list
  736. context_id : 0x0000 (0)
  737. num_transfer_syntaxes : 0x01 (1)
  738. abstract_syntax: struct ndr_syntax_id
  739. uuid : 4b324fc8-1670-01d3-1278-5a47bf6ee188
  740. if_version : 0x00000003 (3)
  741. transfer_syntaxes: ARRAY(1)
  742. transfer_syntaxes: struct ndr_syntax_id
  743. uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860
  744. if_version : 0x00000002 (2)
  745. auth_info : DATA_BLOB length=0
  746. rpc_api_pipe: host 192.168.0.100
  747. rpc_read_send: data_to_read: 52
  748. state->pkt: struct ncacn_packet
  749. rpc_vers : 0x05 (5)
  750. rpc_vers_minor : 0x00 (0)
  751. ptype : DCERPC_PKT_BIND_ACK (12)
  752. pfc_flags : 0x03 (3)
  753. 1: DCERPC_PFC_FLAG_FIRST
  754. 1: DCERPC_PFC_FLAG_LAST
  755. 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
  756. 0: DCERPC_PFC_FLAG_CONC_MPX
  757. 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
  758. 0: DCERPC_PFC_FLAG_MAYBE
  759. 0: DCERPC_PFC_FLAG_OBJECT_UUID
  760. drep: ARRAY(4)
  761. [0] : 0x10 (16)
  762. [1] : 0x00 (0)
  763. [2] : 0x00 (0)
  764. [3] : 0x00 (0)
  765. frag_length : 0x0044 (68)
  766. auth_length : 0x0000 (0)
  767. call_id : 0x00000001 (1)
  768. u : union dcerpc_payload(case 12)
  769. bind_ack: struct dcerpc_bind_ack
  770. max_xmit_frag : 0x10b8 (4280)
  771. max_recv_frag : 0x10b8 (4280)
  772. assoc_group_id : 0x000053f0 (21488)
  773. secondary_address_size : 0x000d (13)
  774. secondary_address : '\pipe\srvsvc'
  775. _pad1 : DATA_BLOB length=1
  776. [0000] 00 .
  777. num_results : 0x01 (1)
  778. ctx_list: ARRAY(1)
  779. ctx_list: struct dcerpc_ack_ctx
  780. result : DCERPC_BIND_ACK_RESULT_ACCEPTANCE (0)
  781. reason : union dcerpc_bind_ack_reason(case 0)
  782. value : DCERPC_BIND_ACK_REASON_NOT_SPECIFIED (0)
  783. syntax: struct ndr_syntax_id
  784. uuid : 8a885d04-1ceb-11c9-9fe8-08002b104860
  785. if_version : 0x00000002 (2)
  786. auth_info : DATA_BLOB length=0
  787. rpc_api_pipe: got frag len of 68 at offset 0: NT_STATUS_OK
  788. rpc_api_pipe: host 192.168.0.100 returned 68 bytes.
  789. check_bind_response: accepted!
  790. cli_rpc_pipe_open_noauth: opened pipe srvsvc to machine 192.168.0.100 and bound anonymously.
  791. srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
  792. in: struct srvsvc_NetShareEnumAll
  793. server_unc : *
  794. server_unc : '192.168.0.100'
  795. info_ctr : *
  796. info_ctr: struct srvsvc_NetShareInfoCtr
  797. level : 0x00000001 (1)
  798. ctr : union srvsvc_NetShareCtr(case 1)
  799. ctr1 : *
  800. ctr1: struct srvsvc_NetShareCtr1
  801. count : 0x00000000 (0)
  802. array : NULL
  803. max_buffer : 0xffffffff (4294967295)
  804. resume_handle : *
  805. resume_handle : 0x00000000 (0)
  806. &r: struct ncacn_packet
  807. rpc_vers : 0x05 (5)
  808. rpc_vers_minor : 0x00 (0)
  809. ptype : DCERPC_PKT_REQUEST (0)
  810. pfc_flags : 0x03 (3)
  811. 1: DCERPC_PFC_FLAG_FIRST
  812. 1: DCERPC_PFC_FLAG_LAST
  813. 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
  814. 0: DCERPC_PFC_FLAG_CONC_MPX
  815. 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
  816. 0: DCERPC_PFC_FLAG_MAYBE
  817. 0: DCERPC_PFC_FLAG_OBJECT_UUID
  818. drep: ARRAY(4)
  819. [0] : 0x10 (16)
  820. [1] : 0x00 (0)
  821. [2] : 0x00 (0)
  822. [3] : 0x00 (0)
  823. frag_length : 0x0018 (24)
  824. auth_length : 0x0000 (0)
  825. call_id : 0x00000002 (2)
  826. u : union dcerpc_payload(case 0)
  827. request: struct dcerpc_request
  828. alloc_hint : 0x0000004c (76)
  829. context_id : 0x0000 (0)
  830. opnum : 0x000f (15)
  831. object : union dcerpc_object(case 0)
  832. empty: struct dcerpc_empty
  833. stub_and_verifier : DATA_BLOB length=0
  834. rpc_api_pipe: host 192.168.0.100
  835. rpc_read_send: data_to_read: 876
  836. state->pkt: struct ncacn_packet
  837. rpc_vers : 0x05 (5)
  838. rpc_vers_minor : 0x00 (0)
  839. ptype : DCERPC_PKT_RESPONSE (2)
  840. pfc_flags : 0x03 (3)
  841. 1: DCERPC_PFC_FLAG_FIRST
  842. 1: DCERPC_PFC_FLAG_LAST
  843. 0: DCERPC_PFC_FLAG_PENDING_CANCEL_OR_HDR_SIGNING
  844. 0: DCERPC_PFC_FLAG_CONC_MPX
  845. 0: DCERPC_PFC_FLAG_DID_NOT_EXECUTE
  846. 0: DCERPC_PFC_FLAG_MAYBE
  847. 0: DCERPC_PFC_FLAG_OBJECT_UUID
  848. drep: ARRAY(4)
  849. [0] : 0x10 (16)
  850. [1] : 0x00 (0)
  851. [2] : 0x00 (0)
  852. [3] : 0x00 (0)
  853. frag_length : 0x037c (892)
  854. auth_length : 0x0000 (0)
  855. call_id : 0x00000002 (2)
  856. u : union dcerpc_payload(case 2)
  857. response: struct dcerpc_response
  858. alloc_hint : 0x00000364 (868)
  859. context_id : 0x0000 (0)
  860. cancel_count : 0x00 (0)
  861. reserved : 0x00 (0)
  862. stub_and_verifier : DATA_BLOB length=868
  863. [0000] 01 00 00 00 01 00 00 00 0C 00 02 00 0B 00 00 00 ........ ........
  864. [0010] 10 00 02 00 0B 00 00 00 14 00 02 00 03 00 00 80 ........ ........
  865. [0020] 18 00 02 00 1C 00 02 00 00 00 00 00 20 00 02 00 ........ .... ...
  866. [0030] 24 00 02 00 00 00 00 00 28 00 02 00 2C 00 02 00 $....... (...,...
  867. [0040] 00 00 00 00 30 00 02 00 34 00 02 00 00 00 00 00 ....0... 4.......
  868. [0050] 38 00 02 00 3C 00 02 00 00 00 00 00 40 00 02 00 8...<... ....@...
  869. [0060] 44 00 02 00 00 00 00 00 48 00 02 00 4C 00 02 00 D....... H...L...
  870. [0070] 00 00 00 00 50 00 02 00 54 00 02 00 00 00 00 00 ....P... T.......
  871. [0080] 58 00 02 00 5C 00 02 00 00 00 00 00 60 00 02 00 X...\... ....`...
  872. [0090] 64 00 02 00 00 00 00 00 68 00 02 00 05 00 00 00 d....... h.......
  873. [00A0] 00 00 00 00 05 00 00 00 49 00 50 00 43 00 24 00 ........ I.P.C.$.
  874. [00B0] 00 00 00 00 1D 00 00 00 00 00 00 00 1D 00 00 00 ........ ........
  875. [00C0] 49 00 50 00 43 00 20 00 53 00 65 00 72 00 76 00 I.P.C. . S.e.r.v.
  876. [00D0] 69 00 63 00 65 00 20 00 28 00 54 00 72 00 75 00 i.c.e. . (.T.r.u.
  877. [00E0] 65 00 4E 00 41 00 53 00 20 00 53 00 65 00 72 00 e.N.A.S. .S.e.r.
  878. [00F0] 76 00 65 00 72 00 29 00 00 00 00 00 07 00 00 00 v.e.r.). ........
  879. [0100] 00 00 00 00 07 00 00 00 43 00 6F 00 6D 00 69 00 ........ C.o.m.i.
  880. [0110] 63 00 73 00 00 00 00 00 07 00 00 00 00 00 00 00 c.s..... ........
  881. [0120] 07 00 00 00 43 00 6F 00 6D 00 69 00 63 00 73 00 ....C.o. m.i.c.s.
  882. [0130] 00 00 00 00 0E 00 00 00 00 00 00 00 0E 00 00 00 ........ ........
  883. [0140] 44 00 6F 00 63 00 75 00 6D 00 65 00 6E 00 74 00 D.o.c.u. m.e.n.t.
  884. [0150] 61 00 72 00 69 00 65 00 73 00 00 00 0E 00 00 00 a.r.i.e. s.......
  885. [0160] 00 00 00 00 0E 00 00 00 44 00 6F 00 63 00 75 00 ........ D.o.c.u.
  886. [0170] 6D 00 65 00 6E 00 74 00 61 00 72 00 69 00 65 00 m.e.n.t. a.r.i.e.
  887. [0180] 73 00 00 00 03 00 00 00 00 00 00 00 03 00 00 00 s....... ........
  888. [0190] 54 00 56 00 00 00 00 00 03 00 00 00 00 00 00 00 T.V..... ........
  889. [01A0] 03 00 00 00 54 00 56 00 00 00 00 00 0A 00 00 00 ....T.V. ........
  890. [01B0] 00 00 00 00 0A 00 00 00 4C 00 69 00 6E 00 75 00 ........ L.i.n.u.
  891. [01C0] 78 00 20 00 49 00 53 00 4F 00 00 00 0A 00 00 00 x. .I.S. O.......
  892. [01D0] 00 00 00 00 0A 00 00 00 4C 00 69 00 6E 00 75 00 ........ L.i.n.u.
  893. [01E0] 78 00 20 00 49 00 53 00 4F 00 00 00 0A 00 00 00 x. .I.S. O.......
  894. [01F0] 00 00 00 00 0A 00 00 00 44 00 6F 00 77 00 6E 00 ........ D.o.w.n.
  895. [0200] 6C 00 6F 00 61 00 64 00 73 00 00 00 0A 00 00 00 l.o.a.d. s.......
  896. [0210] 00 00 00 00 0A 00 00 00 44 00 6F 00 77 00 6E 00 ........ D.o.w.n.
  897. [0220] 6C 00 6F 00 61 00 64 00 73 00 00 00 07 00 00 00 l.o.a.d. s.......
  898. [0230] 00 00 00 00 07 00 00 00 54 00 56 00 20 00 4E 00 ........ T.V. .N.
  899. [0240] 65 00 77 00 00 00 00 00 07 00 00 00 00 00 00 00 e.w..... ........
  900. [0250] 07 00 00 00 54 00 56 00 20 00 4E 00 65 00 77 00 ....T.V. .N.e.w.
  901. [0260] 00 00 00 00 06 00 00 00 00 00 00 00 06 00 00 00 ........ ........
  902. [0270] 4D 00 75 00 73 00 69 00 63 00 00 00 06 00 00 00 M.u.s.i. c.......
  903. [0280] 00 00 00 00 06 00 00 00 4D 00 75 00 73 00 69 00 ........ M.u.s.i.
  904. [0290] 63 00 00 00 07 00 00 00 00 00 00 00 07 00 00 00 c....... ........
  905. [02A0] 4D 00 6F 00 76 00 69 00 65 00 73 00 00 00 00 00 M.o.v.i. e.s.....
  906. [02B0] 07 00 00 00 00 00 00 00 07 00 00 00 4D 00 6F 00 ........ ....M.o.
  907. [02C0] 76 00 69 00 65 00 73 00 00 00 00 00 0A 00 00 00 v.i.e.s. ........
  908. [02D0] 00 00 00 00 0A 00 00 00 4D 00 6F 00 76 00 69 00 ........ M.o.v.i.
  909. [02E0] 65 00 73 00 20 00 34 00 4B 00 00 00 0A 00 00 00 e.s. .4. K.......
  910. [02F0] 00 00 00 00 0A 00 00 00 4D 00 6F 00 76 00 69 00 ........ M.o.v.i.
  911. [0300] 65 00 73 00 20 00 34 00 4B 00 00 00 07 00 00 00 e.s. .4. K.......
  912. [0310] 00 00 00 00 07 00 00 00 42 00 61 00 63 00 6B 00 ........ B.a.c.k.
  913. [0320] 75 00 70 00 00 00 00 00 0F 00 00 00 00 00 00 00 u.p..... ........
  914. [0330] 0F 00 00 00 42 00 61 00 63 00 6B 00 75 00 70 00 ....B.a. c.k.u.p.
  915. [0340] 20 00 46 00 6F 00 6C 00 64 00 65 00 72 00 73 00 .F.o.l. d.e.r.s.
  916. [0350] 00 00 00 00 0B 00 00 00 6C 00 02 00 00 00 00 00 ........ l.......
  917. [0360] 00 00 00 00 ....
  918. Got pdu len 892, data_len 868
  919. rpc_api_pipe: got frag len of 892 at offset 0: NT_STATUS_OK
  920. rpc_api_pipe: host 192.168.0.100 returned 868 bytes.
  921. srvsvc_NetShareEnumAll: struct srvsvc_NetShareEnumAll
  922. out: struct srvsvc_NetShareEnumAll
  923. info_ctr : *
  924. info_ctr: struct srvsvc_NetShareInfoCtr
  925. level : 0x00000001 (1)
  926. ctr : union srvsvc_NetShareCtr(case 1)
  927. ctr1 : *
  928. ctr1: struct srvsvc_NetShareCtr1
  929. count : 0x0000000b (11)
  930. array : *
  931. array: ARRAY(11)
  932. array: struct srvsvc_NetShareInfo1
  933. name : *
  934. name : 'IPC$'
  935. type : STYPE_IPC_HIDDEN (0x80000003)
  936. comment : *
  937. comment : 'IPC Service (TrueNAS Server)'
  938. array: struct srvsvc_NetShareInfo1
  939. name : *
  940. name : 'Comics'
  941. type : STYPE_DISKTREE (0x0)
  942. comment : *
  943. comment : 'Comics'
  944. array: struct srvsvc_NetShareInfo1
  945. name : *
  946. name : 'Documentaries'
  947. type : STYPE_DISKTREE (0x0)
  948. comment : *
  949. comment : 'Documentaries'
  950. array: struct srvsvc_NetShareInfo1
  951. name : *
  952. name : 'TV'
  953. type : STYPE_DISKTREE (0x0)
  954. comment : *
  955. comment : 'TV'
  956. array: struct srvsvc_NetShareInfo1
  957. name : *
  958. name : 'Linux ISO'
  959. type : STYPE_DISKTREE (0x0)
  960. comment : *
  961. comment : 'Linux ISO'
  962. array: struct srvsvc_NetShareInfo1
  963. name : *
  964. name : 'Downloads'
  965. type : STYPE_DISKTREE (0x0)
  966. comment : *
  967. comment : 'Downloads'
  968. array: struct srvsvc_NetShareInfo1
  969. name : *
  970. name : 'TV New'
  971. type : STYPE_DISKTREE (0x0)
  972. comment : *
  973. comment : 'TV New'
  974. array: struct srvsvc_NetShareInfo1
  975. name : *
  976. name : 'Music'
  977. type : STYPE_DISKTREE (0x0)
  978. comment : *
  979. comment : 'Music'
  980. array: struct srvsvc_NetShareInfo1
  981. name : *
  982. name : 'Movies'
  983. type : STYPE_DISKTREE (0x0)
  984. comment : *
  985. comment : 'Movies'
  986. array: struct srvsvc_NetShareInfo1
  987. name : *
  988. name : 'Movies 4K'
  989. type : STYPE_DISKTREE (0x0)
  990. comment : *
  991. comment : 'Movies 4K'
  992. array: struct srvsvc_NetShareInfo1
  993. name : *
  994. name : 'Backup'
  995. type : STYPE_DISKTREE (0x0)
  996. comment : *
  997. comment : 'Backup Folders'
  998. totalentries : *
  999. totalentries : 0x0000000b (11)
  1000. resume_handle : *
  1001. resume_handle : 0x00000000 (0)
  1002. result : WERR_OK
  1003. smb-network: do_mount - [smb://192.168.0.100; 1] dir = 0x7fcb8c01bbb0, cancelled = 0, errno = [0] 'Success'
  1004. smb-network: update_cache - updating...
  1005. smb-network: update_cache - done.
  1006. smb-network: do_mount - login successful, res = 1
  1007. smb-network: send_reply(0x55898e0b59c0), failed=0 ()
  1008. smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
  1009. smb-network: Queued new job 0x55898e09a210 (GVfsJobQueryInfo)
  1010. smb-network: send_reply(0x55898e09a210), failed=0 ()
  1011. smb-network: backend_dbus_handler org.gtk.vfs.Mount:CreateDirectoryMonitor (pid=21265)
  1012. smb-network: Queued new job 0x7fcb8c03e4e0 (GVfsJobCreateMonitor)
  1013. smb-network: send_reply(0x7fcb8c03e4e0), failed=1 (Operation not supported)
  1014. smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryFilesystemInfo (pid=21265)
  1015. smb-network: Queued new job 0x7fcb8c03e570 (GVfsJobQueryFsInfo)
  1016. smb-network: send_reply(0x7fcb8c03e570), failed=0 ()
  1017. smb-network: backend_dbus_handler org.gtk.vfs.Mount:Enumerate (pid=21265)
  1018. smb-network: Queued new job 0x55898e0ad1a0 (GVfsJobEnumerate)
  1019. smb-network: send_reply(0x55898e0ad1a0), failed=0 ()
  1020. smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
  1021. smb-network: Queued new job 0x55898e09a350 (GVfsJobQueryInfo)
  1022. smb-network: send_reply(0x55898e09a350), failed=0 ()
  1023. smb-network: backend_dbus_handler org.gtk.vfs.Mount:QueryInfo (pid=21265)
  1024. smb-network: Queued new job 0x55898e09a3f0 (GVfsJobQueryInfo)
  1025. smb-network: send_reply(0x55898e09a3f0), failed=0 ()
  1026. smb-network: backend_dbus_handler org.gtk.vfs.Mount:MountMountable (pid=21265)
  1027. smb-network: Queued new job 0x55898e09a490 (GVfsJobMountMountable)
  1028. smb-network: send_reply(0x55898e09a490), failed=0 ()
  1029. smb: g_vfs_backend_smb_init: default workgroup = 'NULL'
  1030. smb: Added new job source 0x5565d088a080 (GVfsBackendSmb)
  1031. smb: Queued new job 0x5565d088b960 (GVfsJobMount)
  1032. INFO: Current debug levels:
  1033. all: 10
  1034. tdb: 10
  1035. printdrivers: 10
  1036. lanman: 10
  1037. smb: 10
  1038. rpc_parse: 10
  1039. rpc_srv: 10
  1040. rpc_cli: 10
  1041. passdb: 10
  1042. sam: 10
  1043. auth: 10
  1044. winbind: 10
  1045. vfs: 10
  1046. idmap: 10
  1047. quota: 10
  1048. acls: 10
  1049. locking: 10
  1050. msdfs: 10
  1051. dmapi: 10
  1052. registry: 10
  1053. scavenger: 10
  1054. dns: 10
  1055. ldb: 10
  1056. tevent: 10
  1057. auth_audit: 10
  1058. auth_json_audit: 10
  1059. kerberos: 10
  1060. drs_repl: 10
  1061. smb2: 10
  1062. smb2_credits: 10
  1063. dsdb_audit: 10
  1064. dsdb_json_audit: 10
  1065. dsdb_password_audit: 10
  1066. dsdb_password_json_audit: 10
  1067. dsdb_transaction_audit: 10
  1068. dsdb_transaction_json_audit: 10
  1069. dsdb_group_audit: 10
  1070. dsdb_group_json_audit: 10
  1071. Using netbios name HOST.
  1072. Using workgroup SAMBA.
  1073. smb: do_mount - URI = smb://192.168.0.100/downloads
  1074. smb: do_mount - try #0
  1075. smbc_stat(smb://192.168.0.100/downloads)
  1076. smb: auth_callback - kerberos pass
  1077. smb: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
  1078. SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
  1079. -> server_n=[192.168.0.100] server=[192.168.0.100]
  1080. Connecting to 192.168.0.100 at port 445
  1081. socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
  1082. Kerberos auth with 'jason@SAMBA' (SAMBA\jason) to access '192.168.0.100' not possible
  1083. SPNEGO login failed: {Access Denied} A process has requested access to an object but has not been granted those access rights.
  1084. map_errno_from_nt_status: 32 bit codes: code=c0000022
  1085. smb: do_mount - [smb://192.168.0.100/downloads; 0] res = -1, cancelled = 0, errno = [13] 'Permission denied'
  1086. smb: do_mount - enabling NTLMSSP fallback
  1087. smb: do_mount - try #1
  1088. smbc_stat(smb://192.168.0.100/downloads)
  1089. smb: auth_callback - ccache pass
  1090. smb: auth_callback - out: last_user = 'jason', last_domain = 'SAMBA'
  1091. SMBC_server: server_n=[192.168.0.100] server=[192.168.0.100]
  1092. -> server_n=[192.168.0.100] server=[192.168.0.100]
  1093. Connecting to 192.168.0.100 at port 445
  1094. socket options: SO_KEEPALIVE=0, SO_REUSEADDR=0, SO_BROADCAST=0, TCP_NODELAY=1, TCP_KEEPCNT=9, TCP_KEEPIDLE=7200, TCP_KEEPINTVL=75, IPTOS_LOWDELAY=0, IPTOS_THROUGHPUT=0, SO_REUSEPORT=0, SO_SNDBUF=87040, SO_RCVBUF=131072, SO_SNDLOWAT=1, SO_RCVLOWAT=1, SO_SNDTIMEO=0, SO_RCVTIMEO=0, TCP_QUICKACK=1, TCP_DEFER_ACCEPT=0, TCP_USER_TIMEOUT=0
  1095. cli_session_setup_spnego_send: Connect to 192.168.0.100 as jason@SAMBA using SPNEGO
  1096. GENSEC backend 'gssapi_spnego' registered
  1097. GENSEC backend 'gssapi_krb5' registered
  1098. GENSEC backend 'gssapi_krb5_sasl' registered
  1099. GENSEC backend 'spnego' registered
  1100. GENSEC backend 'schannel' registered
  1101. GENSEC backend 'naclrpc_as_system' registered
  1102. GENSEC backend 'sasl-EXTERNAL' registered
  1103. GENSEC backend 'ntlmssp' registered
  1104. GENSEC backend 'ntlmssp_resume_ccache' registered
  1105. GENSEC backend 'http_basic' registered
  1106. GENSEC backend 'http_ntlm' registered
  1107. GENSEC backend 'http_negotiate' registered
  1108. Starting GENSEC mechanism spnego
  1109. Starting GENSEC submechanism gse_krb5
  1110. Cannot do GSE to an IP address
  1111. Failed to start GENSEC client mech gse_krb5: NT_STATUS_INVALID_PARAMETER
  1112. Starting GENSEC submechanism ntlmssp
  1113. negotiate: struct NEGOTIATE_MESSAGE
  1114. Signature : 'NTLMSSP'
  1115. MessageType : NtLmNegotiate (1)
  1116. NegotiateFlags : 0x62088215 (1644724757)
  1117. 1: NTLMSSP_NEGOTIATE_UNICODE
  1118. 0: NTLMSSP_NEGOTIATE_OEM
  1119. 1: NTLMSSP_REQUEST_TARGET
  1120. 1: NTLMSSP_NEGOTIATE_SIGN
  1121. 0: NTLMSSP_NEGOTIATE_SEAL
  1122. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  1123. 0: NTLMSSP_NEGOTIATE_LM_KEY
  1124. 0: NTLMSSP_NEGOTIATE_NETWARE
  1125. 1: NTLMSSP_NEGOTIATE_NTLM
  1126. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  1127. 0: NTLMSSP_ANONYMOUS
  1128. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  1129. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  1130. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  1131. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  1132. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  1133. 0: NTLMSSP_TARGET_TYPE_SERVER
  1134. 0: NTLMSSP_TARGET_TYPE_SHARE
  1135. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  1136. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  1137. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  1138. 0: NTLMSSP_NEGOTIATE_TARGET_INFO
  1139. 1: NTLMSSP_NEGOTIATE_VERSION
  1140. 1: NTLMSSP_NEGOTIATE_128
  1141. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  1142. 0: NTLMSSP_NEGOTIATE_56
  1143. DomainNameLen : 0x0000 (0)
  1144. DomainNameMaxLen : 0x0000 (0)
  1145. DomainName : *
  1146. DomainName : ''
  1147. WorkstationLen : 0x0000 (0)
  1148. WorkstationMaxLen : 0x0000 (0)
  1149. Workstation : *
  1150. Workstation : ''
  1151. Version: struct ntlmssp_VERSION
  1152. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (6)
  1153. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (1)
  1154. ProductBuild : 0x0000 (0)
  1155. Reserved: ARRAY(3)
  1156. [0] : 0x00 (0)
  1157. [1] : 0x00 (0)
  1158. [2] : 0x00 (0)
  1159. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (15)
  1160. gensec_update_send: ntlmssp[0x7f547401dd60]: subreq: 0x7f54740050f0
  1161. gensec_update_send: spnego[0x7f5474016e60]: subreq: 0x7f54740210c0
  1162. gensec_update_done: ntlmssp[0x7f547401dd60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7f54740050f0/../../auth/ntlmssp/ntlmssp.c:180]: state[2] error[0 (0x0)] state[struct gensec_ntlmssp_update_state (0x7f54740052b0)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:215]
  1163. gensec_update_done: spnego[0x7f5474016e60]: NT_STATUS_MORE_PROCESSING_REQUIRED tevent_req[0x7f54740210c0/../../auth/gensec/spnego.c:1631]: state[2] error[0 (0x0)] state[struct gensec_spnego_update_state (0x7f5474021280)] timer[(nil)] finish[../../auth/gensec/spnego.c:2116]
  1164. Got challenge flags:
  1165. Got NTLMSSP neg_flags=0x628a8215
  1166. NTLMSSP_NEGOTIATE_UNICODE
  1167. NTLMSSP_REQUEST_TARGET
  1168. NTLMSSP_NEGOTIATE_SIGN
  1169. NTLMSSP_NEGOTIATE_NTLM
  1170. NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  1171. NTLMSSP_TARGET_TYPE_SERVER
  1172. NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  1173. NTLMSSP_NEGOTIATE_TARGET_INFO
  1174. NTLMSSP_NEGOTIATE_VERSION
  1175. NTLMSSP_NEGOTIATE_128
  1176. NTLMSSP_NEGOTIATE_KEY_EXCH
  1177. challenge: struct CHALLENGE_MESSAGE
  1178. Signature : 'NTLMSSP'
  1179. MessageType : NtLmChallenge (0x2)
  1180. TargetNameLen : 0x000c (12)
  1181. TargetNameMaxLen : 0x000c (12)
  1182. TargetName : *
  1183. TargetName : 'LANBOX'
  1184. NegotiateFlags : 0x628a8215 (1653244437)
  1185. 1: NTLMSSP_NEGOTIATE_UNICODE
  1186. 0: NTLMSSP_NEGOTIATE_OEM
  1187. 1: NTLMSSP_REQUEST_TARGET
  1188. 1: NTLMSSP_NEGOTIATE_SIGN
  1189. 0: NTLMSSP_NEGOTIATE_SEAL
  1190. 0: NTLMSSP_NEGOTIATE_DATAGRAM
  1191. 0: NTLMSSP_NEGOTIATE_LM_KEY
  1192. 0: NTLMSSP_NEGOTIATE_NETWARE
  1193. 1: NTLMSSP_NEGOTIATE_NTLM
  1194. 0: NTLMSSP_NEGOTIATE_NT_ONLY
  1195. 0: NTLMSSP_ANONYMOUS
  1196. 0: NTLMSSP_NEGOTIATE_OEM_DOMAIN_SUPPLIED
  1197. 0: NTLMSSP_NEGOTIATE_OEM_WORKSTATION_SUPPLIED
  1198. 0: NTLMSSP_NEGOTIATE_THIS_IS_LOCAL_CALL
  1199. 1: NTLMSSP_NEGOTIATE_ALWAYS_SIGN
  1200. 0: NTLMSSP_TARGET_TYPE_DOMAIN
  1201. 1: NTLMSSP_TARGET_TYPE_SERVER
  1202. 0: NTLMSSP_TARGET_TYPE_SHARE
  1203. 1: NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY
  1204. 0: NTLMSSP_NEGOTIATE_IDENTIFY
  1205. 0: NTLMSSP_REQUEST_NON_NT_SESSION_KEY
  1206. 1: NTLMSSP_NEGOTIATE_TARGET_INFO
  1207. 1: NTLMSSP_NEGOTIATE_VERSION
  1208. 1: NTLMSSP_NEGOTIATE_128
  1209. 1: NTLMSSP_NEGOTIATE_KEY_EXCH
  1210. 0: NTLMSSP_NEGOTIATE_56
  1211. ServerChallenge : 8878f2a845d5d18a
  1212. Reserved : 0000000000000000
  1213. TargetInfoLen : 0x006a (106)
  1214. TargetInfoMaxLen : 0x006a (106)
  1215. TargetInfo : *
  1216. TargetInfo: struct AV_PAIR_LIST
  1217. count : 0x00000006 (6)
  1218. pair: ARRAY(6)
  1219. pair: struct AV_PAIR
  1220. AvId : MsvAvNbDomainName (0x2)
  1221. AvLen : 0x000c (12)
  1222. Value : union ntlmssp_AvValue(case 0x2)
  1223. AvNbDomainName : 'LANBOX'
  1224. pair: struct AV_PAIR
  1225. AvId : MsvAvNbComputerName (0x1)
  1226. AvLen : 0x000c (12)
  1227. Value : union ntlmssp_AvValue(case 0x1)
  1228. AvNbComputerName : 'LANBOX'
  1229. pair: struct AV_PAIR
  1230. AvId : MsvAvDnsDomainName (0x4)
  1231. AvLen : 0x0012 (18)
  1232. Value : union ntlmssp_AvValue(case 0x4)
  1233. AvDnsDomainName : 'local.lan'
  1234. pair: struct AV_PAIR
  1235. AvId : MsvAvDnsComputerName (0x3)
  1236. AvLen : 0x0020 (32)
  1237. Value : union ntlmssp_AvValue(case 0x3)
  1238. AvDnsComputerName : 'lanbox.local.lan'
  1239. pair: struct AV_PAIR
  1240. AvId : MsvAvTimestamp (0x7)
  1241. AvLen : 0x0008 (8)
  1242. Value : union ntlmssp_AvValue(case 0x7)
  1243. AvTimestamp : Wed May 4 04:27:07 AM 2022 CST
  1244. pair: struct AV_PAIR
  1245. AvId : MsvAvEOL (0x0)
  1246. AvLen : 0x0000 (0)
  1247. Value : union ntlmssp_AvValue(case 0x0)
  1248. Version: struct ntlmssp_VERSION
  1249. ProductMajorVersion : NTLMSSP_WINDOWS_MAJOR_VERSION_6 (0x6)
  1250. ProductMinorVersion : NTLMSSP_WINDOWS_MINOR_VERSION_1 (0x1)
  1251. ProductBuild : 0x0000 (0)
  1252. Reserved : 000000
  1253. NTLMRevisionCurrent : NTLMSSP_REVISION_W2K3 (0xF)
  1254. gensec_update_send: ntlmssp[0x7f547401dd60]: subreq: 0x7f547401a960
  1255. gensec_update_send: spnego[0x7f5474016e60]: subreq: 0x7f5474035210
  1256. gensec_update_done: ntlmssp[0x7f547401dd60]: NT_STATUS_WRONG_CREDENTIAL_HANDLE tevent_req[0x7f547401a960/../../auth/ntlmssp/ntlmssp.c:180]: state[3] error[-7963671676338568462 (0x917B5ACDC00002F2)] state[struct gensec_ntlmssp_update_state (0x7f547401ab20)] timer[(nil)] finish[../../auth/ntlmssp/ntlmssp.c:218]
  1257. gensec_spnego_client_negTokenTarg_step: SPNEGO(ntlmssp) login failed: NT_STATUS_WRONG_CREDENTIAL_HANDLE
  1258. gensec_update_done: spnego[0x7f5474016e60]: NT_STATUS_WRONG_CREDENTIAL_HANDLE tevent_req[0x7f5474035210/../../auth/gensec/spnego.c:1631]: state[3] error[-7963671676338568462 (0x917B5ACDC00002F2)] state[struct gensec_spnego_update_state (0x7f54740353d0)] timer[(nil)] finish[../../auth/gensec/spnego.c:2039]
  1259. SPNEGO login failed: The supplied credential handle does not match the credential that is associated with the security context.
  1260. map_errno_from_nt_status: 32 bit codes: code=c00002f2
  1261. smb: do_mount - [smb://192.168.0.100/downloads; 1] res = -1, cancelled = 0, errno = [22] 'Invalid argument'
  1262. smb: do_mount - (errno != EPERM && errno != EACCES), cancelled = 0, breaking
  1263. smb: send_reply(0x5565d088b960), failed=1 (Failed to mount Windows share: Invalid argument)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement